NVIDIA announced yesterday the end of driver support for all 32-bit operating systems and for any GPU architecture. The company says that version 390 of its GPU video driver will be the last to support 32-bit platforms.

Four major banks from South Korea have filed a lawsuit against Newegg, a US-based computer parts retailer, alleging the company has participated in a massive financial scheme that has defrauded the banks with hundreds of millions of dollars.

Speaking at the Ekoparty security conference in Buenos Aires, Argentina, security researcher Alfredo Ortega has revealed that you can use your hard disk drive (HDD) as a rudimentary microphone to can pick up nearby sounds.

A team of three scientists from Columbia University has discovered that by attacking the combo of hardware and software management utilities embedded with modern chipsets, threat actors can take over systems via an attack surface found in almost all modern electronic devices.

Heating, ventilation, and air conditioning (HVAC) systems can be used as a means to bridge air-gapped networks with the outside world, allowing remote attackers to send commands to malware placed inside a target's isolated network.

Six scientists from Zhejiang University in China have discovered that they could use ultrasound frequencies — inaudible to human ears — to send commands to speech recognition software and take over devices such as smartphones, smart home assistants, or even cars.

A US man has filed a lawsuit against Logitech, a Swiss-based manufacturer of electronic devices, on accusations that Logitech had intentionally delayed and tried to discourage warranty claims for defective products, falsely advertised products, and even hid an End-Of-Life (EOL) announcement from customers.

At a recently concluded security conference, experts from an Israeli university have presented new research that describes a possible attack scenario which leverages replacement parts to carry out attacks on smartphones and other smart devices.

New research published this week by researchers from the University of Washington shows how an attacker could track a user's movements using speakers and microphones that come with computers, laptops, tablets, smartphones, and other devices.